咨询与建议

限定检索结果

文献类型

  • 1,068 篇 会议
  • 685 篇 期刊文献
  • 12 册 图书

馆藏范围

  • 1,765 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 1,042 篇 工学
    • 809 篇 计算机科学与技术...
    • 675 篇 软件工程
    • 204 篇 信息与通信工程
    • 156 篇 控制科学与工程
    • 92 篇 生物工程
    • 80 篇 机械工程
    • 75 篇 生物医学工程(可授...
    • 72 篇 电子科学与技术(可...
    • 65 篇 电气工程
    • 52 篇 光学工程
    • 51 篇 仪器科学与技术
    • 44 篇 安全科学与工程
    • 43 篇 建筑学
    • 42 篇 化学工程与技术
    • 36 篇 网络空间安全
    • 35 篇 动力工程及工程热...
  • 516 篇 理学
    • 206 篇 数学
    • 178 篇 物理学
    • 111 篇 生物学
    • 78 篇 统计学(可授理学、...
    • 58 篇 系统科学
    • 47 篇 化学
  • 404 篇 管理学
    • 270 篇 管理科学与工程(可...
    • 169 篇 图书情报与档案管...
    • 128 篇 工商管理
  • 111 篇 医学
    • 94 篇 临床医学
    • 63 篇 基础医学(可授医学...
    • 43 篇 公共卫生与预防医...
  • 59 篇 法学
    • 49 篇 社会学
  • 50 篇 经济学
    • 50 篇 应用经济学
  • 35 篇 教育学
  • 28 篇 农学
  • 16 篇 文学
  • 5 篇 军事学
  • 2 篇 艺术学

主题

  • 70 篇 deep learning
  • 49 篇 machine learning
  • 47 篇 computer science
  • 44 篇 information syst...
  • 40 篇 data mining
  • 36 篇 feature extracti...
  • 32 篇 multimedia syste...
  • 28 篇 information tech...
  • 25 篇 internet of thin...
  • 24 篇 neural networks
  • 24 篇 computational mo...
  • 24 篇 artificial intel...
  • 23 篇 security
  • 22 篇 application soft...
  • 22 篇 testing
  • 22 篇 accuracy
  • 21 篇 support vector m...
  • 20 篇 decision making
  • 20 篇 humans
  • 18 篇 authentication

机构

  • 38 篇 department of co...
  • 23 篇 distributed mult...
  • 22 篇 department of el...
  • 22 篇 department of co...
  • 19 篇 department of co...
  • 18 篇 department of el...
  • 17 篇 distributed mult...
  • 17 篇 department of in...
  • 16 篇 department of co...
  • 12 篇 department of co...
  • 12 篇 department of in...
  • 12 篇 department of co...
  • 12 篇 faculty of commu...
  • 10 篇 department of ap...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 10 篇 department of co...
  • 9 篇 department of sy...
  • 8 篇 computer science...
  • 8 篇 applied science ...

作者

  • 25 篇 abdelwahed motwa...
  • 25 篇 shu-ching chen
  • 24 篇 mei-ling shyu
  • 20 篇 mesfer al duhayy...
  • 19 篇 chen shu-ching
  • 18 篇 shyu mei-ling
  • 18 篇 manar ahmed hamz...
  • 17 篇 ishfaq yaseen
  • 16 篇 mohamed k.nour
  • 13 篇 abu sarwar zaman...
  • 13 篇 pinandito aryo
  • 13 篇 abdullah rusli
  • 12 篇 saud s.alotaibi
  • 11 篇 shahaboddin sham...
  • 10 篇 radwa marzouk
  • 10 篇 shamshirband sha...
  • 10 篇 anwer mustafa hi...
  • 10 篇 hala j.alshahran...
  • 10 篇 ahmedy ismail
  • 10 篇 rusli abdullah

语言

  • 1,719 篇 英文
  • 39 篇 其他
  • 8 篇 中文
检索条件"机构=Department of Computer Graphics and Multimedia Faculty of Computer Science and Information System"
1765 条 记 录,以下是131-140 订阅
排序:
Prediabetes Detection Using Non-Laboratory Data with Extreme Gradient Boosting Algorithm  11
Prediabetes Detection Using Non-Laboratory Data with Extreme...
收藏 引用
11th International Conference on Electrical Engineering, computer science and Informatics, EECSI 2024
作者: Rizqie, Muhammad Qurhanul Liberty, Iche A Septadina, Indri S Putra, Pacu Rini, Dian Palupi Universitas Sriwijaya Department of Informatics Faculty of Computer Science South Sumatera Indonesia Universitas Sriwijaya Department of Public Health and Community Medicine Faculty of Medicine South Sumatera Indonesia Universitas Sriwijaya Department of Anatomy Faculty of Medicine South Sumatera Indonesia Universitas Sriwijaya Department of Information System Faculty of Computer Science South Sumatera Indonesia
Diabetes Mellitus (DM), characterized by high blood glucose levels, is a dangerous condition that leads to severe long-term health issues. Meanwhile, prediabetes is a condition where individuals have an increased risk... 详细信息
来源: 评论
A Proposed Ontology-Based Sociocultural Context Model  19
A Proposed Ontology-Based Sociocultural Context Model
收藏 引用
19th International Conference on Web information systems and Technologies, WEBIST 2023
作者: Rennane, Fatma-Zohra Meziane, Abdelkrim Department of Computer Science University of Science and Technologies Houari Boumedien Bab Ezzouar Algiers Algeria Multimedia and Information System Division Research Centre on Scientific and Technical Information Ben Aknoun Algiers Algeria
The global business landscape, including the handicraft sector in the Maghreb region, has witnessed a significant transformation with the emergence of information and Communication Technologies (ICT). To adapt to this... 详细信息
来源: 评论
A Comparative Study on Deep Learning Models for Stock Price Prediction  5
A Comparative Study on Deep Learning Models for Stock Price ...
收藏 引用
5th Asia-Pacific Conference on Image Processing, Electronics and computers, IPEC 2024
作者: He, Zhexin Zhang, Huan Por, Lip Yee Chongqing College of Architecture and Technology Chongqing401331 China Chongqing Academy of Science and Technology Chongqing401123 China Department of Computer System and Technology Faculty of Computer Science and Information Technology Universiti Malaya Kuala Lumpur50603 Malaysia
With the advancement of deep learning technology, researchers have begun employing deep neural network models such as LSTM, MLP, CNN, and GRU to tackle nonlinear prediction problems in stock markets. This study harnes... 详细信息
来源: 评论
Priority Based Cyber Incident Handling: Work in Progress  11
Priority Based Cyber Incident Handling: Work in Progress
收藏 引用
11th International Conference on Electrical Engineering, computer science and Informatics, EECSI 2024
作者: Mulyati Stiawan, Deris Widhiarso, Wijang Budiarto, Rahmat Multi Data Palembang University & Faculty of Engineering Universitas Sriwijaya Department of Information System Palembang Indonesia Sriwijaya University Faculty of Computer Science Palembang Indonesia Multi Data Palembang University Department of Informatics Palembang Indonesia College of Computer Science & IT Albaha University Saudi Arabia
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ... 详细信息
来源: 评论
Natural Language Processing Studies in Humancomputer Interaction: A Bibliometric Analysis and Future Research Framework  22
Natural Language Processing Studies in HumanComputer Interac...
收藏 引用
22nd IEEE Student Conference on Research and Development, SCOReD 2024
作者: Rashid, Farah Syazwani Binti Mohd Kamsin, Amirrudin Bin Noor, Nurul Fazmidar Binti Mohd Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System Technology Kuala Lumpur50603 Malaysia Universiti Teknologi MARA College of Computing Informatics and Mathematics Selangor Shah Alam40450 Malaysia
This study conducts a bibliometric analysis of Natural Language Processing (NLP) within Human-computer Interaction (HCI) to identify trends, challenges, and future directions. Analyzing 1,710 SCOPUS-indexed documents ... 详细信息
来源: 评论
Gamification using Octalysis Framework in Knowledge Management system for Vocational High Schools during the Covid-19 Pandemic  7
Gamification using Octalysis Framework in Knowledge Manageme...
收藏 引用
7th International Conference on Informatics and Computing, ICIC 2022
作者: Firdaus, Mgs. Afriyan Indah, Dwi Rosa Sazaki, Yoppy Ariefin, Eka Prasetyo Nuriza, Muhammad Fachri Rafly, Muhammad Universitas Sriwijaya Faculty of Computer Science Information System Department Palembang Indonesia Universitas Sriwijaya Data Structure and Accounting Information System Laboratory Faculty of Computer Science Palembang Indonesia Universitas Sriwijaya Faculty of Computer Science Informatics Management Department Palembang Indonesia
Knowledge management systems enable teachers and students to interact directly in the knowledge transfer process during the Covid-19 pandemic. In addition, applying the gamification concept in vocational disciplines c... 详细信息
来源: 评论
Optimizing Connections:Applied Shortest Path Algorithms for MANETs
收藏 引用
computer Modeling in Engineering & sciences 2024年 第10期141卷 787-807页
作者: Ibrahim Alameri Jitka Komarkova Tawfik Al-Hadhrami Abdulsamad Ebrahim Yahya Atef Gharbi Faculty of Medical Sciences Jabir Ibn Hayyan Medical UniversityAlkufaNajaf54001Iraq Faculty of Economics and Administration University of PardubiceStudentskaPardubice53210Czech Republic Computer Science Department School of Science and TechnologyNottingham Trent UniversityNottinghamNG118NSUK Department of Information Technology College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia Department of Information System College of Computing and Information TechnologyNorthern Border UniversityArar91431Saudi Arabia
This study is trying to address the critical need for efficient routing in Mobile Ad Hoc Networks(MANETs)from dynamic topologies that pose great challenges because of the mobility of *** objective was to delve into an... 详细信息
来源: 评论
IoT-Based Transmission Tower Monitoring Communications and Visualization Platform  6
IoT-Based Transmission Tower Monitoring Communications and V...
收藏 引用
6th IEEE Symposium on Future Telecommunication Technologies, SOFTT 2022
作者: Mohd Alias, Mohamad Razin Naim Mohd Dzaki, Dzahir Rashidi Din, Norashidah Md Deros, Siti Noratiqah Mohd Passarella, Rossi Amier Chaai, Azzam Eusuf Chaai Malaysia Universitas Sriwijaya Computer Networking and Information System Faculty of Computer Science Department Palembang Indonesia Malaysia
Transmission tower fault monitoring has always been a challenge for power system engineers. Vertical and horizontal displacement monitoring is important for evaluating health status of transmission tower's infrast... 详细信息
来源: 评论
Clustering Mechanism in Particle Swarm Optimization Algorithm for Data Aggregation  13
Clustering Mechanism in Particle Swarm Optimization Algorith...
收藏 引用
13th IEEE Symposium on computer Applications and Industrial Electronics, ISCAIE 2023
作者: Sharmin, Sharmin Ahmedy, Ismail Noor, Rafidah Md Ismail, Habibah Universiti Malaya Faculty of Computer Science and Information Technology Department of Computer System and Technology Kuala Lumpur50603 Malaysia Univesrsiti Teknologi MARA Computer Science Unit Centre of Foundation Studies Selangor Dengkil43800 Malaysia
Wireless Sensor Networks (WSNs) consist of numerous sensor nodes with distinct resources working together to achieve a common objective efficiently. A critical issue is extending the network lifetime of WSNs, especial... 详细信息
来源: 评论
Modified Aquila Optimizer Feature Selection Approach and Support Vector Machine Classifier for Intrusion Detection system
收藏 引用
multimedia Tools and Applications 2024年 第21期83卷 59887-59913页
作者: Abualigah, Laith Ahmed, Saba Hussein Almomani, Mohammad H. Zitar, Raed Abu Alsoud, Anas Ratib Abuhaija, Belal Hanandeh, Essam Said Jia, Heming Elminaam, Diaa Salama Abd Elaziz, Mohamed Abd Computer Science Department Al Al-Bayt University Mafraq25113 Jordan Department of Electrical and Computer Engineering Lebanese American University Byblos13-5053 Lebanon Hourani Center for Applied Scientific Research Al-Ahliyya Amman University Amman19328 Jordan MEU Research Unit Middle East University Amman11831 Jordan Applied Science Research Center Applied Science Private University Amman11931 Jordan School of Computer Sciences Universiti Sains Malaysia Pulau Pinang11800 Malaysia School of Engineering and Technology Sunway University Malaysia Petaling Jaya27500 Malaysia Department of Mathematics Facility of Science The Hashemite University P.O box 330127 Zarqa13133 Jordan Sorbonne Center of Artificial Intelligence Sorbonne University-Abu Dhabi Abu Dhabi United Arab Emirates Department of Computer Science Wenzhou-Kean University Wenzhou China Department of Computer Information System Zarqa University P.O. Box 13132 Zarqa Jordan School of Information Engineering Sanming University Sanming365004 China Information Systems Department Faculty of Computers and Artificial Intelligence Benha University Benha12311 Egypt Computer Science Department Faculty of Computer Science Misr International University Cairo12585 Egypt Faculty of Computer Science & Engineering Galala University Suze435611 Egypt Ajman University Ajman346 United Arab Emirates Department of Mathematics Faculty of Science Zagazig University Zagazig44519 Egypt
With the ever-expanding ubiquity of the Internet, wireless networks have permeated every facet of modern life, escalating concerns surrounding network security for users. Consequently, the demand for a robust Intrusio... 详细信息
来源: 评论